网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()
- A、 You can use the ls subcommand of ufsrestore.
- B、 You can use the add subcommand of ufsrestore.
- C、 You can use the select subcommand of ufsrestore.
- D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
参考答案
更多 “ While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()A、 You can use the ls subcommand of ufsrestore.B、 You can use the add subcommand of ufsrestore.C、 You can use the select subcommand of ufsrestore.D、 You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.” 相关考题
考题
● The most common non-behavioral reason for projects being completed behind schedule and over budget is:A Selecting the wrong person as the project managerB Selecting the wrong person as the sponsorC Accepting a high-risk projectD Ill-defined requirementsE All of the above
考题
In the last sentence of the second paragraph, the pronoun 'it 'refers to '_____.
A.fitting our actions to those of other people appropriatelyB.identification of other people's statusesC.selecting one's own statusesD.selecting one's own statuses
考题
Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN)while duplicating a running database?()
A. Creating the control file for the duplicate databaseB. Restoring the target data files to the duplicate databaseC. Performing complete recovery using all available backupsD. Generating a new, unique DBID for the duplicate databaseE. Copying the online redo log files from the target database to the duplicate database
考题
With which three tasks does the IPS Policies Wizard help you? ()A、Selecting the interface to which the IPS rule will be appliedB、Selecting the Signature Definition File (SDF) that the router will useC、Selecting the direction of traffic that will be inspectedD、Selecting the inspection policy that will be applied to the interface
考题
You decided to change the location of the flash recovery area. You executed the following command: ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’+disk1’ SCOPE=BOTH SID=’*’; Which statement is true?()A、 The location can be changed only if the flash recovery area is empty.B、 After executing the command, all new flash recovery area files will be created in the new location.C、 The command will generate an error because you cannot change the flash recovery area while the database is open.D、 All the existing files in the flash recovery area will be moved to the new location and all new Flash Recovery Area files will be created in the new location.
考题
While performing the backup of the flash recovery area, you notice that one of the archived redo log files is missing. You have multiple destinations for archived redo log files. What implications does it have on the backup of the flash recovery area?()A、The backup fails because one of the archived redo log files is missing. B、The backup succeeds but it would be without the missing archived log. C、During backup, you are prompted for the alternative destination for the missing archived redo log file. D、The backup succeeds because it fails over to one of the alternative archived redo log destinations.
考题
You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers. All confidential company files are stored on a file server named TestKing1. The written company security states that all confidential data must be stored and transmitted in a secure manner. To comply with the security policy, you enable Encrypting File System (EFS) on the confidential files. You also add EFS certificates to the data decryption field (DDF) of the confidential files for the users who need to access them. While performing network monitoring, you notice that the confidential files that are stored on TestKing1 are being transmitted over the network without encryption. You must ensure that encryption is always used when the confidential files on TestKing1 are stored and transmitted over the network. What are two possible ways to accomplish this goal? ()(Each correct answer presents a complete solution. Choose two)A、Enable offline files for the confidential files that are stored on TestKing1, and select the Encrypt offline files to secure data check box on the client computers of the users who need to access the files.B、Use IPSec encryption between TestKing1 and the client computers of the users who need to access the confidential files.C、Use Server Message Block (SMB) signing between TestKing1 and the client computers of the users who need to access the confidential files.D、Disable all LM and NTLM authentication methods on TestKing1.E、Use IIS to publish the confidential files. Enable SSL on the IIS server. Open the files as a Web folder.
考题
You are working with a team of developers on a Web site. You copy the Web site from the staging server to work on it locally. While making changes, you create new C# source code files and delete old ones. You need to ensure that your changes propagate to the staging server without affecting any files that you have not modified. Which tool should you use? ()A、XCOPYB、the Copy Web toolC、the Publish Web toolD、a Web Setup project
考题
You need to enhance performance of foreground and background applications. How can you configure Windows 2000 Professional to process both foreground and background applications at the same priority? ()A、By selecting the applications options in the performance options dialog box.B、By selecting the application services option in the performance options dialog box.C、By selecting the background option in the performance options dialog box.D、By selecting the background services option in the performance options dialog box.
考题
单选题While selecting files during an interactive restore with ufsrestore, you are interrupted by a junior administrator before you can complete the file selection process and start the restore. After answering the administrator’s question, you realize that you have forgotten which files you had already selected for the restore. How can you determine which files are already marked for extraction and restore? ()A
You can use the ls subcommand of ufsrestore.B
You can use the add subcommand of ufsrestore.C
You can use the select subcommand of ufsrestore.D
You can view the selected files as they are marked with a plus sign (+) in the list that is permanently displayed in the upper half of the interactive ufsrestore screen view.
考题
单选题You decided to change the location of the flash recovery area. You executed the following command: Which statement is true?()A
The location can be changed only if the flash recovery area is empty.B
After executing the command, all new flash recovery area files will be created in the new location.C
The command will generate an error because you cannot change the flash recovery area while the database is open.D
All the existing files in the flash recovery area will be moved to the new location, and all new Flash Recovery Area files will be created in the new location.
考题
单选题Which of the following RAID configurations provides the BEST performance for database files while still providing redundancy?()A
RAID 0B
RAID 1C
RAID 3D
RAID 5
考题
单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()A
New channels for restore and recovery tasksB
New name for the data files of the tablespaceC
Auxiliary name for the data files of the tablespaceD
Auxiliary destinations for an auxiliary set of data files
考题
单选题You decided to change the location of the flash recovery area. You executed the following command: ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’+disk1’ SCOPE=BOTH SID=’*’; Which statement is true?()A
The location can be changed only if the flash recovery area is empty.B
After executing the command, all new flash recovery area files will be created in the new location.C
The command will generate an error because you cannot change the flash recovery area while the database is open.D
All the existing files in the flash recovery area will be moved to the new location and all new Flash Recovery Area files will be created in the new location.
考题
单选题You are working with a team of developers on a Web site. You copy the Web site from the staging server to work on it locally. While making changes, you create new C# source code files and delete old ones. You need to ensure that your changes propagate to the staging server without affecting any files that you have not modified. Which tool should you use? ()A
XCOPYB
the Copy Web toolC
the Publish Web toolD
a Web Setup project
考题
多选题Which three statements are true about the stages of database startup?()AData files and redo log files can be renamed at the MOUNT stage.BControl files are read at the OPEN stage for the location of data files.CControl files are required to bring the database to the NOMOUNT stage.DData files and redo log files are made available to users at the OPEN stage.EData files and online redo log files are checked for consistency while opening the database
考题
单选题You need to enhance performance of foreground and background applications. How can you configure Windows 2000 Professional to process both foreground and background applications at the same priority? ()A
By selecting the applications options in the performance options dialog box.B
By selecting the application services option in the performance options dialog box.C
By selecting the background option in the performance options dialog box.D
By selecting the background services option in the performance options dialog box.
考题
单选题Which options must you configure while performing an automated Tablespace Point-in-Time Recovery (TSPITR) by using Recovery Manager (RMAN)?()A
New channels for restore and recovery tasksB
New name for the data files of the tablespaceC
Auxiliary name for the data files of the tablespaceD
Auxiliary destinations for an auxiliary set of data files
考题
多选题Which two operations are NOT performed by the DUPLICATE command in Recovery Manager (RMAN)while duplicating a running database?()ACreating the control file for the duplicate databaseBRestoring the target data files to the duplicate databaseCPerforming complete recovery using all available backupsDGenerating a new, unique DBID for the duplicate databaseECopying the online redo log files from the target database to the duplicate database
考题
单选题While planning to manage more than one database in your system, you perform the following activities: 1. Organize different categories of files into independent subdirectories. 2. Use consistent naming convention for database files. 3. Separate administrative information pertaining to each database. Which option corresponds to the type of activities performed by you?()A
Oracle Managed FilesB
Oracle Grid ArchitectureC
Optimal Flexible ArchitectureD
Oracle database architecture
考题
单选题You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. Confidential files are stored on a member server named TK1. The computer object for TK1 resides in an organizational unit (OU) named Confidential. A Group Policy object (GPO) named GPO1 is linked to the Confidential OU. To audit access to the confidential files, you enable auditing on all private folders on TK1. Several days later, you review the audit logs. You discover that auditing is not successful. You need to ensure that auditing occurs successfully. What should you do?()A
Start the System Event Notification Service (SENS) on TK1.B
Start the Error Reporting service on TK1.C
Modify the Default Domain Controllers GPO by selecting Success and Failure as the Audit Object Access setting.D
Modify GPO1 by selecting Success and Failure as the Audit Object Access setting.
考题
单选题While performing the backup of the flash recovery area, you notice that one of the archived redo log files is missing. You have multiple destinations for archived redo log files. What implications does it have on the backup of the flash recovery area?()A
The backup fails because one of the archived redo log files is missing.B
The backup succeeds but it would be without the missing archived log.C
During backup,you are prompted for the alternative destination for the missing archived redo log file.D
The backup succeeds because it fails over to one of the alternative archived redo log destinations.
热门标签
最新试卷